Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 14:56

General

  • Target

    JaffaCakes118_884b87d53acc97bef8b4d3330c152ef492a155f7d28b2e0b15bc86017d8da44d.dll

  • Size

    490KB

  • MD5

    56d48e1813dd5b00ba4c5716434ea656

  • SHA1

    5ef6f3a5aeac831f5e4ac6e26766ca0fc771d481

  • SHA256

    884b87d53acc97bef8b4d3330c152ef492a155f7d28b2e0b15bc86017d8da44d

  • SHA512

    97b482f7e7eb55de3af714b50fec861e441c65d0a74b979c7409c481e9422e94dbf7298f510ff4b4e41ba8d6689cfd32c20a5a64c042dba820c7f10dad9b3fdd

  • SSDEEP

    12288:mFnmEQb6xK6EOcEELeBdUDBBe6pLtzPhGHUaRa:knmj6xK1y3Ik6TZGRa

Malware Config

Extracted

Family

icedid

Campaign

3467965077

C2

firenicatrible.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_884b87d53acc97bef8b4d3330c152ef492a155f7d28b2e0b15bc86017d8da44d.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4620

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4620-1-0x0000000002D10000-0x0000000002D1E000-memory.dmp

    Filesize

    56KB

  • memory/4620-0-0x0000000002D10000-0x0000000002D1E000-memory.dmp

    Filesize

    56KB